Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Australia Crime Security

Self-Proclaimed LulzSec Leader Arrested In Australia 127

New submitter AlbanX writes "An IT professional working in Sydney has been arrested for hacking a government website as part of the LulzSec movement. The 24-year-old man, residing in Point Clare, was arrested at his workplace late yesterday. He claimed to be the leader of the hacker movement. 'Police say he was in a "position of trust" within the company and had access to information on government clients. The AFP says its investigation began less than two weeks ago when investigators found a government website had been compromised. The man has been charged with two counts of unauthorised modification of data to cause impairment and one count of unauthorised access to a restricted computer system. He faces a maximum of 12 years in jail.'"
This discussion has been archived. No new comments can be posted.

Self-Proclaimed LulzSec Leader Arrested In Australia

Comments Filter:
  • Oh Really? (Score:1, Redundant)

    by Frosty Piss ( 770223 ) *

    At 24, he's a "senior Australian IT professional" for an "international IT company"? Well, there's your problem right there. Skinny jeans and a hoodie? Check! Who hired this guy?

    • by mjwx ( 966435 )

      At 24, he's a "senior Australian IT professional" for an "international IT company"? Well, there's your problem right there. Skinny jeans and a hoodie? Check! Who hired this guy?

      You must be unfamiliar with how consultancies work.

      Everyone, even the tea lady is a senior. I have seen "Senior Trainee" before, I kid you not.

    • Re: (Score:3, Interesting)

      What the AFP claims is a total lie.

      "He was a low-level support tech who was on a three-month probation,” Wurth said. “He had no access to any type of customer data apart from support tickets" [itnews.com.au]

      So essentially a script kidding working a low level tech support job. Not exactly a criminal mastermind.

      • Re:Oh Really? (Score:4, Insightful)

        by GumphMaster ( 772693 ) on Wednesday April 24, 2013 @12:27AM (#43533673)

        When it comes to FUD and the Internet it only matters what material he could potentially have had access to, not what he actually had, or was supposed to have, access to. If Content Security handles any information anywhere that might be sensitive or politically embarrassing then the case will proceed on the assumption that Flannery had access to that information and used it. Flannery will, of course, have to spend serious dollars defending against these broad claims regardless of their veracity.

      • by rtb61 ( 674572 )

        What is it with computer crime that gets any police force involved to wildly exaggerate everything to do with it. From the skills of the accused, the claimed crimes committed, the damage caused, the global impact or the justification for promotions. The bullshit desire for massive headlines only to have it all deflate as the internet picks over the story as the slowly collapsing prosecution proceeds to a rather minor event.

        It seems driven by two things a desire for promotion and a need to flood the airwa

        • by PRMan ( 959735 )
          Or it could just be because they are dumb and don't understand the magic computer-box thingy...
          • No, if they said "senior" without being told he was senior that's a lie, not exaggeration or assumption.
          • by rtb61 ( 674572 )

            Even then simple rules of personal security that should be followed. To conduct activity, boot from a USB thumb drive with different IP and mac address set and completely different identity, when not conducting activities thumb drive should be safely hidden. Main computer should contain dysfunctional root hack that points back to thumb drive identity (for when you're lazy and get caught). Preferably only ever use open wifi points, rather than home connection. There are a whole bunch of activities that a re

        • What is it with computer crime that gets any police force involved to wildly exaggerate everything to do with it. From the skills of the accused, the claimed crimes committed, the damage caused, the global impact or the justification for promotions. The bullshit desire for massive headlines only to have it all deflate as the internet picks over the story as the slowly collapsing prosecution proceeds to a rather minor event.

          Because this is a standard example of geeks forgetting that they're not typical. A proportionately small number of geeks watch the story "all deflate as the internet picks over the story as the slowly collapsing prosecution proceeds to a rather minor event".

          The great unwashed masses just saw (and remember) the initial headlines, and have moved on to the next oversold story, rather than following the increasingly mundane details of the true story behind the original headlines. After all, "previously hyped

        • What is it with computer crime that gets any police force involved to wildly exaggerate everything to do with it.

          Indeed. This guy's (alleged) crime was simply defacing a Government website. Now I'm not saying that's a good thing - for a group calling itself lulzsec, this is so profoundly and tiresomely unfunny, it's not funny. But it certainly is not on the scale of unpleasantness of some of the other so-called hacktivist groups that think it's cool to publish peoples' credit card details.

          Probably the worst part of it all is that the taxpayer will have to cough up to support his tenure in some "correctional" institu

          • by cffrost ( 885375 )

            Probably the worst part of it all is that the taxpayer will have to cough up to support his tenure in some "correctional" institution, whereas some form of useful slave labour in community service might at least do somebody enough good to justify this adolescent's pathetic little life.

            Yeah right, that's the worst part. Nobody ever thinks about the things North Korea gets right. Scandinavian countries could do this are get a handle on their out-of-control crime and recidivism rates.

      • by dbIII ( 701233 )
        But I thought they'd been watching Mr Anderson for some time?
      • Re: (Score:2, Interesting)

        by Anonymous Coward

        I used to work for a public sector body who gave their first line support peons (wheter outsorced or insourced) domain admin accounts. They 'required' this in order to fix issues remotely, but the higher-ups didn't understand the full extent of the access they had, and the lower-downs I guess didn't feel the need to restrict their access by telling them. The security guys were pointless.

        We were going through a restructure, and I knew a bit about the document management system because I had to fix issues wit

    • From what I read he is senior in the same way a building toilet cleaner could be classed as a senior building engineer. The guy was a junior support tech on probation.
    • Seriously. I can picture this guy yelling I AM SPARTICUS from his jail cell.
      Okay, maybe not yelling. Crying?

      In any event, he's temporarily famous.
    • The real problem is probably that you believe everything you read. Somebody probably told the reporter that he got into trouble hacking XP Professional at his high school when he was a senior, then the reporter writes "senior", "IT", "XP", and "Professional" in his notes and before you know it he's a "senior IT Professional". If you read the first article and follow the denial link, his company makes clear that He was a low-level support tech who was on a three-month probation,” Wurth said. “H [itnews.com.au]
  • by Guppy06 ( 410832 ) on Tuesday April 23, 2013 @11:24PM (#43533389)

    ... in Vienna.

    • Well, clearly Australia isn't safe to do it in! They would get nabbed here.... unless they did it anonymously... no wait... too soon?

    • Re: (Score:2, Funny)

      by cas2000 ( 148703 )

      only the american members of anonymous will hold their protest in vienna.

      those from the rest of the world have at least a basic knowledge of geography.

      • by dbIII ( 701233 )
        Funny thing is there is a big red post box at shopping centre near me where somebody has peeled off a few letters to turn "Australia Post" into "Austria Post".
  • If he was working in Australian IT, especially for the government, he was probably so bored to death by his job that he needed an outlet.

    These poor IT 'professionals' should be nurtured, not punished. Have sympathy for their pain. Finding bugs in 10 year old spaghetti code will do anybody's head in.
    • Finding bugs in 10 year old spaghetti code will do anybody's head in.

      As will finding bugs ten years ago and finding them still not fixed... That's closer to how I feel with these sort of things....

  • by Fluffeh ( 1273756 ) on Tuesday April 23, 2013 @11:48PM (#43533483)

    ... says the seriousness of the crime is not about the magnitude of damage done, but the breach of security.

    Which is a nice way of saying "Well, they didn't really do anything that bad, but they made a lot of people look foolish, so they must be punished harshly...". I think these days we must remember that pulling down someone's trousers in public will make an enemy of that person - and their friends.

    • Translation (Score:1, Insightful)

      by Anonymous Coward

      "Flannery was charged with hacking offences, and is alleged to have defaced a government website this month. [but nobody noticed or cared enough, so you don't know which one] The AFP confirmed it was not a Federal Government website. [are the afraid we'll laugh if they mention the site?]"

      "It is not about the magnitude of damage, its about the vulnerabilities that exist, [indeed vendors get away with faulty products full of security holes]" he said. "No one has tacit consent to acceas such information [Yet y

      • by uncqual ( 836337 )

        [...] A website surely has tacit consent to access the website or I'm in deep trouble, because I've been accessing information from millions of websites!

        If a local mom-and-pop store lets you enter their premises to shop, do you think that also gives you the right to overturn the shelves and spray paint graffiti on the walls? After all, a mom-and-pop store isn't very significant in any (even tiny) country with a GDP over a billion USD and low wage employees can reverse the damage for only a few thousand doll

      • Re:Translation (Score:4, Informative)

        by GumphMaster ( 772693 ) on Wednesday April 24, 2013 @12:31AM (#43533697)

        [but nobody noticed or cared enough, so you don't know which one] The AFP confirmed it was not a Federal Government website. [are the afraid we'll laugh if they mention the site?]

        Somebody mentioned it because the ABC is reporting [abc.net.au]:

        The LulzSec group allegedly broke into Australian Government departments, universities and schools in 2011. Some of the targets included AusAid, Victorian Government departments and local councils in Victoria and New South Wales.

      • by Anonymous Coward
        did you miss the bit where he claims to be the leader of lulzsec? what's your point anyway? that people should be allowed to deface any website they like and/or access any system they like?
        • by Anonymous Coward

          "did you miss the bit where he claims to be the leader of lulzsec?"
          How can a leaderless group of anons have a leader? Or are they like Cylons? Only other Cylons know who is Cylon, but humans can't tell, so they walk among us, and are anonymous, yet somehow manage to agree among themselves who is leader and maintain a rank structure?! Perhaps there's an organizational rank chart that shows which Cylon reports to which Cylon??! A board of Cylons appointed to choose the CEO (Cylon executive officer)?

          *OR* perha

  • For most governments worldwide, especially all English-speaking countries who uses the common law, LulzSec , Anonymous etc. are treated like the al-Qaeda of the Internet. You proclaim to have association with them (or even claiming to be "leadership") , then expect government agents on your door soon.

  • Rookie mistake (Score:5, Insightful)

    by Anonymous Coward on Wednesday April 24, 2013 @12:00AM (#43533531)

    Protip: never claim to be the leader of a decentralized vigilante organization.

  • by Bob_Who ( 926234 ) on Wednesday April 24, 2013 @12:06AM (#43533561) Journal

    That will teach 'em. It should put an end to these crimes against authority. I'm sure China and Iran and North Korea will now cower to such impressive spectacle. All anonymity has come to an end. Somehow, I don't feel any safer.

  • by mvar ( 1386987 ) on Wednesday April 24, 2013 @01:49AM (#43533951)
    So how does his CV look like?
    Hobbies:
    - Fishing, basketball, hacking
    Memberships:
    - Leader of the LulzSec group
    • There are only two jobs where having been in prison for a crime can look good on your CV, gangster rapper and information security consultant.

      • by cffrost ( 885375 )

        There are only two jobs where having been in prison for a crime can look good on your CV, gangster rapper and information security consultant.

        Three — confidential informant.

    • There are old hackers and bold hackers...
  • Some elite hacker, He doesn't seem to have made any effort to cover his tracks. His hacker 'handle' is easily found links directly achievements on encyclopediadramatica and his twitter account which leads to his real name, which links to both facebook and linkedin profiles amongst many other sites, with photos and lots of personal data.

  • No...I am the leader of LulzSec :p

Time is the most valuable thing a man can spend. -- Theophrastus

Working...